Sciweavers

3712 search results - page 449 / 743
» Role-Based Access Control
Sort
View
CSB
2004
IEEE
115views Bioinformatics» more  CSB 2004»
15 years 8 months ago
PoPS: A Computational Tool for Modeling and Predicting Protease Specificity
Proteases play a fundamental role in the control of intra- and extracellular processes by binding and cleaving specific amino acid sequences. Identifying these targets is extremel...
Sarah E. Boyd, Maria J. García de la Banda,...
181
Voted
COORDINATION
2006
Springer
15 years 8 months ago
Using Lime to Support Replication for Availability in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) define a challenging computing scenario where access to resources is restrained by connectivity among hosts. Replication offers an opportunity to in...
Amy L. Murphy, Gian Pietro Picco
EUROPAR
2006
Springer
15 years 8 months ago
A One-Stop, Fire-and-(Almost)Forget, Dropping-Off and Rendezvous Point
In order to foster uptake by scientific and business users we need an easy way to access Grid resources. This is the motivation for the A-WARE project. We build upon a fabric layer...
Roger Menday, Björn Hagemeier, Bernd Schuller...
EUROPKI
2006
Springer
15 years 8 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
ACSAC
2001
IEEE
15 years 8 months ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham